Juniper Networks EX2500 Switch User Manual


 
Index 87
Index
Q
QoS
802.1p priority
........................................................63
ACLs..........................................................................52
COS queuing and scheduling.................................64
DSCP.........................................................................60
DSCP mapping, viewing.........................................62
EX2500 QoS model ................................................52
overview...................................................................51
QoS default service levels ......................................62
storm control filters ................................................59
Quality of Service. See QoS.
R
RADIUS
authentication
..........................................................11
port 1812 and 1645................................................55
port 1813 .................................................................55
SSH............................................................................18
Rapid Spanning Tree Protocol. See RSTP.
Remote Monitoring. See RMON.
RMON
alarms
.......................................................................68
events .......................................................................69
history.......................................................................67
overview...................................................................65
statistics....................................................................66
routers and port trunking .............................................43
RSA keys.........................................................................17
RSTP
configuration guidelines
.........................................36
description ...............................................................35
edge ports ................................................................36
link type ...................................................................36
port state changes...................................................35
S
security
port mirroring
..........................................................81
RADIUS authentication...........................................11
TACACS+ authentication.......................................14
VLANs .......................................................................21
segmentation. See IP subnets.
segments. See IP subnets.
service ports
...................................................................55
SNMP ................................................................................7
configuring SNMPv3 .................................................8
enabling v1 and v2 ...................................................7
HP-OpenView ............................................................7
IBM Director...............................................................7
trap host configuration .............................................9
snooping
configuration
............................................................73
IGMP .........................................................................71
IGMPv3 .....................................................................73
Source-Specific Multicast ..............................................73
Spanning Tree Protocol
BPDUs
.......................................................................32
configuration rules ..................................................44
Fast Uplink Convergence........................................41
MSTP.........................................................................39
multiple instances ...................................................38
multiple spanning trees..........................................37
overview...................................................................31
PVRST+ ...................................................................37
RSTP configuration guidelines...............................36
RTSP..........................................................................35
Spanning Tree Group (STG) guidelines .................33
with UFD ..................................................................76
SSH
configuring
...............................................................17
RSA host and server keys.......................................17
SSM..................................................................................73
statistical load distribution............................................43
statistics, RMON.............................................................66
storm control filters.......................................................59
support, technical, requesting.....................................xiii
switch ports VLANs membership ................................22
syntax conventions .......................................................xii
T
TACACS+ authentication.............................................14
tagging. See VLANs, tagging.
TCP
..................................................................................54
technical support, requesting......................................xiii
technical terms
Assured Forwarding (AF)
........................................61
Class Selector (CS)...................................................61
community VLAN....................................................29
Expedited Forwarding (EF) ....................................61
isolated port .............................................................29
isolated VLAN...........................................................29
port VLAN identifier (PVID)....................................23
promiscuous port ....................................................29
tagged frame............................................................23
tagged member .......................................................23
untagged frame .......................................................23
untagged member...................................................23
VLAN identifier (VID) ..............................................23
Telnet ................................................................................5
text conventions ............................................................xii
timeout, LACP, reducing...............................................49
troubleshooting ports....................................................81
trunk hash algorithm.....................................................47
trunking, ports. See port trunking.